Conversation with Hackers: What Movies Get WRONG About Hacking?||cyberguardians||
Автор: CyberGuardians-T
Загружено: 19 апр. 2025 г.
Просмотров: 1 171 просмотр
🔒 Disclaimer: This video is for educational and ethical purposes only*. We do *not promote, support, or encourage any form of illegal hacking, cybercrime, or unauthorized access to systems. Always use your knowledge responsibly and stay within the boundaries of the law.
🔗 murari bro insta id : https://www.instagram.com/murari_tech...
🔗yt channel : / @ethical.hacker.murari
🔗telegram: https://t.me/Ethical_Hacker_Murari_75
🔗cyber matrix bro insta id :
https://www.instagram.com/cybermatrix...
🔗yt channel:
/ @cybermatrix1337
🔗chaityna bro Insta id :
https://www.instagram.com/acep.tech.i...
🔗yt, linkedin:
https://linktr.ee/acep.tech.in.telugu...
Note: sorry guys if their is any misinformation because of my excited i have given some miss information.
📌 Chapters
*00:00 – Introduction & Guest Welcome*
Meet the special guests: Thota Murari (NASA bug finder) and Cyber Matrix (ethical hacker & cybercrime investigator).
01:08 – NASA Bug & Bug Bounty Journey**
Thota Murari's journey to reporting a bug to NASA and receiving an official appreciation letter.
01:46 – Overview of Cybersecurity & Myths**
Introduction to cyber security, the dark web, and clearing common myths and misconceptions.
02:27 – Myth 1: Hacking = One Job Role**
Breaking down the myth that cybersecurity is just one job; intro to different roles like hackers, malware analysts, etc.
03:06 – Myth 2: Can We Hack Wi-Fi?**
Audience's common question about hacking neighbor's Wi-Fi and the truth behind it.
03:43 – Tools Used in Wi-Fi Hacking**
Discussion on adapters, tools like Pineapple, and software used in ethical Wi-Fi testing.
04:22 – Myth 3: Phone Hacking Without Touch**
Debunking the idea of hacking phones without any interaction, and what's actually possible.
05:38 – Brute Force Attacks on Instagram**
Explanation of how brute force works, its limitations, and real-world effectiveness.
06:58 – Gaming Hacks & Cheat Engines**
Exploring how games like PUBG are hacked using cheat engines and manipulating source code.
08:13 - Dark Web Reality and Access
What is the dark web, illegal activities there, and how to safely access it.
10:40 - Using Tor Browser and Search Engines on Dark Web
How to use Tor browser and search engines to browse the dark web.
11:59 - Security of Dark Web Operating Systems (Tails OS)
Introduction to secure OS like Tails for dark web access.
12:48 - Famous Hackers and Whistleblowers
Discussion on Edward Snowden and whistleblowers in cybersecurity.
14:37 - Surveillance Tools and Privacy Concerns
How agencies spy on conversations using smart devices.
15:57 - Secure Dark Web Access and Tools
Best practices for secure dark web usage and recommended tools.
16:41 - Importance of Data and Data Sharing Risks
How data sharing affects national security and cyber attacks.
18:09 - China’s Use of AI and Technology Advancement
Discussion on China’s fast technological growth using AI.
19:04 - Bug Bounty Experience at NASA
Guest shares his bug bounty journey, learning, and challenges.
20:54 - Learning Bug Bounty: Programming and Labs
Importance of programming knowledge and practical labs for bug bounty.
22:21 - Mistakes and Lessons in Bug Bounty Hunting
Personal experience of wasting time on automation and advice.
22:30 - 24:00 Bug Reports and NASA Appreciation
24:00 - 26:00 Bug Bounty vs Vulnerability Disclosure
26:00 - 28:30 Real Hacking Cases and Investigations
28:30 - 30:30 Ethical Hacking Advice for Youth
30:30 - 32:00 Common Scams and How to
Protect Yourself
35:11 - 37:30 Scams with Daily Tasks and Fake Returns
37:30 - 39:50 Split Payment Scams and Verification Tips
39:50 - 42:30 Malicious APK Apps and Banking Trojans
42:30 - 45:30 Real Cases of Money Theft via Fake Apps
45:30 - 48:00 Hardware Hacking Tools: OMG Cables and USB Rubber Duckies
48:00 - 50:30 Risks of Using Free Charging Cables in Public
50:30 - 53:00 How Hackers Exploit Hardware and Software Vulnerabilities
53:00 - 56:00 Ethical Hackers vs Black Hat Hackers Explained
56:00 - 59:30 Positive Roles of Ethical Hackers and Cybercrime Fighters
59:30 - 61:42 Real-Life Scam Examples: Fake Police and Army Impersonators
1:01:50 CYBER SLAVERY
1:05:35 sim swapping explained
1:09:06 Morphing
1:15:05 Golden hour
1:17:45 scammers are smart
1:18:29 loan apps frauds
1:21:56 Not all Play Store apps are safe
1:23:09 lost mobile/tracking
1:25:37 call forwarding scams
1:27:32 Ghibli image trend
1:31:18 will AI replace cybersecurity jobs?
1:32:32 Fingerprint scams
1:36:00 Ind gov sites
1:38:11 Networking for bug Bounty
1:40:03 Ending the video

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: